Carrying Location Objects in RADIUS

Slides:



Advertisements
Similar presentations
Washinton D.C., November 2004 IETF 61 st – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena.
Advertisements

1Nokia Siemens Networks Presentation / Author / Date University of Twente On the Security of the Mobile IP Protocol Family Ulrike Meyer and Hannes Tschofenig.
Identity, Spheres and Privacy Rules Henning Schulzrinne (with Hannes Tschofenig and Richard Barnes) Workshop on Identity, Information and Context October.
Carrying Location Objects in RADIUS Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones.
AAA-Mobile IPv6 Frameworks Alper Yegin IETF Objective Identify various frameworks where AAA is used for the Mobile IPv6 service Agree on one (or.
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
NSIS Authentication, Authorization and Accounting Issues (draft-tschofenig-nsis-aaa-issues-00.txt) Authors: Hannes Tschofenig Henning Schulzrinne Maarten.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning.
1 Local Security Association (LSA) The Temporary Shared Key (TSK) draft-le-aaa-lsa-tsk-00.txt Stefano M. Faccin, Franck Le.
1 RADIUS Mobile IPv6 Support draft-ietf-mip6-radius-01.txt Kuntal Chowdhury Avi Lior Hannes Tschofenig.
Carrying Location Objects in RADIUS Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones.
EAP Extensions for EAP Early Authentication Protocol (EEP) Hao Wang, Yang Shi, Tina Tsou.
Draft-ietf-dime-ikev2-psk-diameter-0draft-ietf-dime-ikev2-psk-diameter-08 draft-ietf-dime-ikev2-psk-diameter-09 in progress Diameter IKEv2 PSK: Pre-Shared.
Some use cases and requirements for handover Information Services Greg Daley MIPSHOP Session IETF 64.
SAML for SIP Hannes Tschofenig, Jon Peterson, James Polk, Douglas Sicker, Marcus Tegnander.
Implications of Trust Relationships for NSIS Signaling (draft-tschofenig-nsis-casp-midcom.txt) Authors: Hannes Tschofenig Henning Schulzrinne.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Carrying Location Objects in RADIUS Presentation written by: Hannes Tschofenig, Allison Mankin Draft Authors: Hannes Tschofenig, F. Adrangi, A. Lior, M.
Draft-ietf-aaa-diameter-mip-15.txt Tom Hiller et al Presented by Pete McCann.
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
Softwire Security Requirement Update draft-ietf-softwire-security-requirements-02.txt IETF Meeting, Prague March 19, 2007 Shu Yamamoto Carl Williams Florent.
Nov. 9, 2004IETF61 PANA WG PANA Specification Last Call Issues Yoshihiro Ohba, Alper Yegin, Basavaraj Patil, D. Forsberg, Hannes Tschofenig.
Diameter SIP Application
Minneapolis, March 2005 IETF 62 nd – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena Demaria.
Extended QoS Authorization for the QoS NSLP Hannes Tschofenig, Joachim Kross.
NSIS QoS NSLP Authorzation Issues Hannes Tschofenig.
Doc.: IEEE /0448r0 Submission March, 2007 Srinivas SreemanthulaSlide 1 Joiint TGU : Emergency Identifiers Notice: This document has been.
Paris, August 2005 IETF 63 rd – mip6 WG Mobile IPv6 bootstrapping in split scenario (draft-ietf-mip6-bootstrapping-split-00) mip6-boot-sol DT Gerardo Giaretta,
MIP6 RADIUS IETF-72 Update draft-ietf-mip6-radius-05.txt A. LiorBridgewater Systems K. ChowdhuryStarent Networks H. Tschofenig Nokia Siemens Networks.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: EAP Pre-authentication Problem Statement in IETF HOKEY WG Date Submitted: September,
MIPv4-Diameter Update Tom Hiller Lucent Technologies.
CAPWAP Threat Analysis
Pre-authentication Problem Statement (draft-ohba-hokeyp-preauth-ps-00
<draft-ohba-pana-framework-00.txt>
Informing AAA about what lower layer protocol is carrying EAP
Open issues with PANA Protocol
RADEXT WG RADIUS Attributes for WLAN Draft-aboba-radext-wlan-00.txt
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
Phil Hunt, Hannes Tschofenig
PANA Issues and Resolutions
Capability Exchange Requirements
Hokey Architecture Deployment and Implementation
Katrin Hoeper Channel Bindings Katrin Hoeper
RELO: Retrieving End System Location Information draft-schulzrinne-geopriv-relo-03 Henning Schulzrinne March 2007 IETF68 - GEOPRIV.
Handover Keys using AAA (draft-vidya-mipshop-fast-handover-aaa-01.txt)
Pre-authentication Overview
ERP extension for EAP Early-authentication Protocol (EEP)
Discussions on FILS Authentication
AAA Support for ERP draft-gaonkar-radext-erp-attrs
Softwire Security Update
draft-ietf-geopriv-lbyr-requirements-02 status update
ERP/AAK support for Inter-AAA realm handover discussion
HTTP Enabled Location Delivery (HELD)
Charles Clancy Katrin Hoeper IETF 73 Minneapolis, USA 17 November 2008
Securing the CASP Protocol
Authors: Hannes Tschofenig Henning Schulzrinne Maarten Buechli
IEEE IETF Liaison Report
RELO: Retrieving End System Location Information draft-schulzrinne-geopriv-relo-03 Henning Schulzrinne March 2007 IETF68 - GEOPRIV.
IEEE IETF Liaison Report
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
IEEE IETF Liaison Report
IEEE IETF Liaison Report
IEEE MEDIA INDEPENDENT HANDOVER
Security Activities in IETF in support of Mobile IP
PAA-2-EP protocol PANA wg - IETF 58 Minneapolis
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Diameter ABFAB Application
Presentation transcript:

Carrying Location Objects in RADIUS <draft-tschofenig-geopriv-radius-lo-00.txt> Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones

RADIUS / Geopriv A quick reminder ... Location Objects are attached to RADIUS messages Location based authorization and taxation possible at home AAA server. RADIUS Access Network AAAL AAAH Home Network RADIUS AP IEEE 802.1x Mobile Node Figure 1: Example Network Topology

What happened since the last IETF meeting? Two presentations have been given at the last IETF meeting: <draft-adrangi-radiusext-location-information-00.txt> <draft-jones-radius-geopriv-00.txt> The authors of the two drafts got together and wrote a new draft: Carrying Location Objects in RADIUS <draft-tschofenig-geopriv-radius-lo-00.txt>

Delivery Methods for Location Information Goal: Location Information must be available at the home AAA server Two means to deliver Location Information to the AAAH: Authentication/Authorization Phase Delivery Mid-session Delivery

Delivery Methods for Location Information Authentication/Authorization Phase Delivery MN NAS AAA Start Auth. Phase RADIUS Access-Request + Loc-Attr. ... multiple roundtrips ... Access-Accept Auth. Accept RADIUS Accounting Request + Loc-Attr.

Delivery Methods for Location Information Mid-session Delivery NAS AAA COA + Service-Type "Authorize Only" COA NAK + Service-Type "Authorize Only" + Error-Cause "Request Initiated" Access-Request + Service-Type "Authorize Only" + Loc-Attr. Access-Accept Legend: Change of Authorization (CoA) message [RFC3576]

New RADIUS Attributes Reusing existing Geopriv work! Operator-Name Attribute This attribute contains an operator name which uniquely identifies the ownership of an access network. Location-Information Attribute Civil Location Information Format [ietf-geopriv-dhcp-civil] Geospatial Location Information Format [RFC3825] Policy-Information Attribute Reuses basic authorization policies from [PDIF-LO] Location-Type Attribute Classes of location types (from 'Coffee Shop' to 'Public Place') Billing-Description Attribute Unstructured text to be printed on the users bill

Location-Information Attribute (0) NAS (1) AAA server (2) User (3) Network Location-Information Attribute (0) Civil (1) Geospatial 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | Code | Precision | | Location-Info ... Civil Location Information 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Countrycode | Civic address elements ... Geospatial Location Information TLV elements: CAtype CAlength CAvalue Example: <3(city), 6, Munich> 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | LaRes | Latitude + | Latitude | LoRes | Longitude + | Longitude | AT | AltRes | Altitude + | Altitude | Datum |

Policy-Information Attribute Fields of the 'usage-rules' element defined in [PIDF-LO]: 'retransmission-allowed': '0' = Recipient is not permitted to share the enclosed Location Information '1' = Recipient is allowed to share Location Information with other parties. 'retention-expires': Absolute date at which time the Recipient is no longer permitted to possess the location information. 'ruleset-reference': This field contains a URI that indicates where a fuller ruleset of policies related to this object can be found.

Privacy Considerations Eavesdropping Threat: Eavesdropper learning Location Information + NAI Assumption: NAI reveals true user identity (might not be the case for some EAP methods) Solution: Use IPsec ESP between AAA servers Already required for key transport Cannot protect against entities participating in the signaling exchange (e.g., AAA server) itself => no true "end-to-end" security

Privacy Considerations Home AAA server acts as Location Server Scenario: Home AAA server retrieves location information and wants to use it for location-based services. Typically no problem since User has a strong trust relationship with home operator based on a contract. Authorization policies can be provided to the home AAA server (or the home network) before the protocol execution starts.

Privacy Considerations Visited AAA server acts as Location Server (1) Scenario: Visited AAA server collects and distributes location information of attached users. The same is applicable to AAA brokers User might not even allow location information to be forwarded to home network Problem: End host and visited network typically shares not trust relationship. Network access authentication procedure is executed to dynamically establish the trust relationship and to establish session keys. These keys are available after successful authentication and authorization. Successful authentication and authorization might require location information

Privacy Considerations Visited AAA server acts as Location Server (2) Approach 1: Use EAP method with active user identity confidentiality Problem: The choice of an EAP method is not only user driven Approach 2: Mandate default policy Problem: Will it be considered by all hot spots? Approach 3: Authorization policies are provided by the home AAA server - possible for mid-session delivery Problem: Addresses only some problems Approach 4: User provides authorization rules to visited network Problem: Securing the LO/Rules is difficult (key management problem) Existing protocols due not support this functionality (see EAP, PANA) Not a RADIUS problem

Outside the Scope Protocols executed between end host and NAS (e.g., EAP) Example: End host providing location information to RADIUS server

Next Steps / Open Issues Should this document become a working group item in the Geopriv working group? Technical issues to add for the next draft version: Scenarios need more text Interworking with DIAMETER needs to be described Discussion on the privacy issues Comments are appreciated!

Questions?